{"id":127579,"date":"2023-11-26T21:35:15","date_gmt":"2023-11-26T21:35:15","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=127579"},"modified":"2023-11-26T21:35:16","modified_gmt":"2023-11-26T21:35:16","slug":"wgu-c836-fundamentals-of-information-security-final-exam-questions-and-verified-answers-2023-2024-update","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/11\/26\/wgu-c836-fundamentals-of-information-security-final-exam-questions-and-verified-answers-2023-2024-update\/","title":{"rendered":"WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| 2023\/ 2024 Update"},"content":{"rendered":"\n<p>WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>Q: What process ensures compliance with applicable laws, policies, and other bodies of<br>administrative control, and detects misuse? This task contains the radio buttons and checkboxes<br>for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.<br>A. Nonrepudiation<br>B. Deterrence<br>C. Auditing<br>D. Accountability<br>E. Authorization<br>Answer:<br>C. Auditing<br>Lesson: Auditing and Accountability<br>Objective: Introduction<br>Q: Nessus is an example of a(n) <strong><em><strong><em>___<\/em><\/strong><\/em><\/strong> tool. This task contains the radio buttons<br>and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.<br>A. Fuzzing<br>B. Anti-virus<br>C. Anti-malware<br>D. Vulnerability scanning<br>E. Penetration testing<br>Answer:<br>D. Vulnerability scanning<br>Q: A surveillance video log contains a record, including the exact date and time, of an<br>individual gaining access to his company&#8217;s office building after hours. He denies that he was<br>there during that time, but the existence of the video log proves otherwise. What benefit of<br>WGU C836 Fundamentals of Information<br>Security Final Exam | Questions and Verified<br>Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>accountability does this example demonstrate? This task contains the radio buttons and<br>checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.<br>A. Deterrence<br>B. Nonrepudiation<br>C. Intrusion detection and prevention<br>D. Authentication<br>E. Authorization<br>Answer:<br>B. Nonrepudiation<br>Q: <strong><em>_<\/em><\/strong> provides us with the means to trace activities in our environment back to their<br>source. This task contains the radio buttons and checkboxes for options. The shortcut keys to<br>perform this task are A to H and alt+1 to alt+9.<br>A. Access<br>B. Authentication<br>C. Accountability<br>D. Authorization<br>E. Nonrepudiation<br>Answer:<br>C. Accountability<br>Q: Backordered Parts is a defense contractor that builds communications parts for the military.<br>The employees use mostly Web-based applications for parts design and information sharing. Due<br>to the sensitive nature of the business, Backordered Parts would like to implement a solution that<br>secures all browser connections to the Web servers. What encryption solution best meets this<br>company&#8217;s needs? This task contains the radio buttons and checkboxes for options.<br>A. Elliptic Curve Cryptography (ECC)<br>B. Digital signatures<br>C. Advanced Encryption Standard (AES)<br>D. Blowfish<br>Answer:<br>A. Elliptic Curve Cryptography (ECC)<\/p>\n\n\n\n<p>Lesson: Cryptography<br>Objective: Alert!<br>Q: Question 3 : We are somewhat limited in our ability to protect which type of data? This task<br>contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are<br>A to H and alt+1 to alt+9.<br>A. Data at rest<br>B. Data in motion<br>C. Data in use<br>Answer:<br>C. Data in use<br>Q: he science of breaking through encryption is known as <strong>_<\/strong>. This task contains the radio<br>buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1<br>to alt+9.<br>A. Ciphertext<br>B. Cryptology<br>C. Cryptography<br>D. Cryptanalysis<br>Answer:<br>D. Cryptanalysis<br>Q: The specifics of the process used to encrypt the plaintext or decrypt the ciphertext<br>Answer:<br>Cryptographic algorithm<br>Q: Also known as private key cryptography, this uses a single key for both encryption of the<br>plaintext and decryption of the ciphertext<\/p>\n\n\n\n<p>Answer:<br>Symmetric key cryptography<br>Example: AES<br>Q: A type of cipher that takes a predetermined number of bits in the plaintext message<br>(commonly 64 bits) and encrypts that block<br>Answer:<br>Block cipher<br>Q: A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time<br>Answer:<br>Stream cipher<br>Q: A set of symmetric block ciphers endorsed by the US government through NIST. Shares the<br>same block modes that DES uses and also includes other modes such as XEX-based Tweaked<br>CodeBook (TCB) mode<br>Answer:<br>AES<br>Q: Also known as public key cryptography, this method uses two keys: a public key and a<br>private key.<br>Answer:<br>Asymmetric key cryptography<br>Q: Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.\"><\/object><a id=\"wp-block-file--media-47c9eb6f-3463-40bf-a85d-080523525b52\" href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" target=\"_blank\" rel=\"noopener\">WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE<\/a><a href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-47c9eb6f-3463-40bf-a85d-080523525b52\" download target=\"_blank\" rel=\"noopener\">Download<\/a><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| 2023\/ 2024 Update Q: What process ensures compliance with applicable laws, policies, and other bodies ofadministrative control, and detects misuse? This task contains the radio buttons and checkboxesfor options. The shortcut keys to perform this task are A to H and alt+1 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-127579","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=127579"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127579\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=127579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=127579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=127579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}